Application Security News and Articles


How to Handle CMMC Scoping for Remote Employees

CMMC mandates that companies working as part of the government supply line need to comply with a level of security determined by their handling of controlled information. Identifying the level of compliance necessary for your business is the ...

How NHIs Contribute to IT Stability

Why Are NHIs Crucial for IT Stability? How often do we consider Non-Human Identities (NHIs) and their role in IT stability? Many organizations are unaware of the strategic importance of NHI management. With more businesses adopt cloud-based ...

Being Proactive with NHIs in Cyber Defense

The Proactive Cyber Defense: Why Embrace NHIs? How often do you consider the role of Non-Human Identities (NHIs)? The significance of NHIs cannot be downplayed. Ensuring the security of these machine identities or NHIs is a cornerstone for a ...

Are Expenditures on NHI Justified?

Does Your Cybersecurity Strategy Justify NHI Costs? Organizations must frequently evaluate their strategies to ascertain if the costs of implementing and maintaining specific security measures are justified. The scenario is no different when it ...

BSidesLV24 – Proving Ground – You Can Be Neurodivergent And Succeed In InfoSec

Author/Presenter: Randall Wyatt Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Best Practices for User Authentication and Authorization in Web Applications: A Comprehensive Security Framework

In a world where credential breaches cost companies millions, strong authentication isn't optional—it's essential. This comprehensive guide breaks down seven critical domains of identity security into actionable strategies that protect your ...

Privacy for Agentic AI

Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking about the security of that now, while its still a nascent idea. In 2019, I ...

Enhancing EHR Security: Best Practices for Protecting Patient Data

In the digital healthcare landscape, electronic health records (EHRs) are foundational to patient care, operational efficiency and regulatory compliance. The post Enhancing EHR Security: Best Practices for Protecting Patient Data appeared first ...

The Cloud Illusion: Why Your Database Security Might Be at Risk

With the right cloud database architecture, you gain versatility as well as optimal security.  The post The Cloud Illusion: Why Your Database Security Might Be at Risk appeared first on Security Boulevard.

Preparing your business for a penetration test

Penetration testing is vital to keeping your business safe in today’s digital landscape, where cyber threats are ever present. It ensures your business’s sensitive data is protected, validating the robustness of the defensive measures your ...

BSidesLV24 – Proving Ground – And What If It Was Hacked? Tactics And Impacts Of Adversarial Machine Learning

Author/Presenter: Larissa Fonseca Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Treasury Moves to Ban Huione Group for Laundering $4 Billion

The Treasury Department is moving to cut off Huione Group, a Cambodian conglomerate, from the U.S. financial system, saying the firm and its multiple entities laundered billions of dollars for North Korea's Lazarus Group and criminal gangs ...

Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)

Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise SonicWall secure mobile access devices, the vendor has confirmed by updating the associated advisories. CISA has added the two flaws to ...

6 Essential Frameworks to Find the Right Customer Problems & Standing Out in a Crowded Software Marketplace

Innovation is never a straight path. Every successful SaaS product or software starts with identifying the right customer problems and differentiating in a competitive landscape....Read More The post 6 Essential Frameworks to Find the Right ...

Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More

In this special edition of the Cybersecurity Snapshot, we’re highlighting some of the most valuable guidance offered by the U.S. Cybersecurity and Infrastructure Security Agency in the past 12 months. Check out best practices, recommendations ...

Cybersecurity Insights with Contrast CISO David Lindner | 05/02/25

Insight No. 1 — Know which vulnerabilities are active in production Consider this: your pre-production scans might flag hundreds of vulnerabilities, but which ones are actually being exploited in your live environment? The uncomfortable truth ...

Raytheon, Nightwing to Pay $8.4 Million in Settlement Over Cybersecurity Failures

The US government says defense contractor Raytheon and Nightwing agreed to pay $8.4 million to settle False Claims Act allegations. The post Raytheon, Nightwing to Pay $8.4 Million in Settlement Over Cybersecurity Failures appeared first on ...

In Other News: NullPoint Source Code Leak, $17,500 for iPhone Flaw, BreachForums Down

Noteworthy stories that might have slipped under the radar: NullPoint Stealer source code leaked, researcher earns $17,500 from Apple for vulnerability, BreachForums down after zero-day exploitation by police. The post In Other News: NullPoint ...

New Microsoft accounts will be “passwordless by default”

Microsoft is making new Microsoft accounts passwordless by default, the company has announced on Thursday, which marked this year’s World Password Day. “As part of [a recently simplified sign-in user experience], we’re changing the ...

NCSC Guidance on “Advanced Cryptography”

The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided ...